Skip to main content

Hackers remotely control jeep

Two US security experts have demonstrated security flaws in a Jeep Cherokee by taking wireless control of its systems from ten miles away. Writing on technology website Wired, Andy Greenberg, who was driving the jeep at the time, tells how Charlie Miller and Chris Valasek first toyed with the vehicle’s air conditioning, entertainment system and windscreen wipers, before cutting the transmission and causing the jeep to slowly come to a halt. Greenberg says, “The most disturbing manoeuvre came when they
July 22, 2015 Read time: 2 mins
Two US security experts have demonstrated security flaws in a Jeep Cherokee by taking wireless control of its systems from ten miles away.

Writing on technology website Wired, Andy Greenberg, who was driving the jeep at the time, tells how Charlie Miller and Chris Valasek first toyed with the vehicle’s air conditioning, entertainment system and windscreen wipers, before cutting the transmission and causing the jeep to slowly come to a halt.

Greenberg says, “The most disturbing manoeuvre came when they cut the jeep’s brakes, leaving me frantically pumping the pedal as the 2-ton SUV slid uncontrollably into a ditch.”

The researchers say they’re working on perfecting their steering control—for now they can only hijack the wheel when the jeep is in reverse. Their hack enables surveillance too: They can track a targeted jeep’s GPS coordinates, measure its speed, and even drop pins on a map to trace its route.

According to Greenberg, all of this is possible only because 1958 Chrysler, like many carmakers, is doing its best to turn the modern automobile into a smartphone. Uconnect, an internet-connected computer feature in hundreds of thousands of Fiat Chrysler cars, SUVs, and trucks, controls the vehicle’s entertainment and navigation, enables phone calls, and even offers a wi-fi hot spot. And thanks to one vulnerable element, which Miller and Valasek won’t currently identify, Uconnect’s cellular connection also lets anyone who knows the car’s IP address gain access from anywhere in the country.

“From an attacker’s perspective, it’s a super nice vulnerability,” Miller says.

Miller and Valasek say the attack on the entertainment system seems to work on any Chrysler vehicle with Uconnect from late 2013, all of 2014, and early 2015. They’ve only tested their full set of physical hacks, including ones targeting transmission and braking systems, on a Jeep Cherokee, though they believe that most of their attacks could be tweaked to work on any Chrysler vehicle with the vulnerable Uconnect head unit.

After being contacted by Miller and Valasek nine months ago, Fiat Chrysler developed a patch which must be manually implemented via a USB stick or by a dealership mechanic.

Related Content

  • September 22, 2015
    Americans steer away from autonomous parking
    According to a new survey from AAA, nearly 80 per cent of American drivers are confident in their parallel parking abilities and only one-in-four would trust this technology to park their vehicle. Despite this, AAA testing found self-parking technology outperformed unassisted drivers in four key areas. In partnership with the Automobile Club of Southern California's Automotive Research Center, AAA tested self-parking features on five vehicles: a 2015 Lincoln MKC, a 2015 Mercedes-Benz ML400 4Matic, a 2015
  • November 12, 2015
    Driver aids make inroads on improving safety
    In-vehicle anti-collision systems continue to evolve and could eliminate some incidents altogether. John Kendall rounds up the current developments. A few weeks ago, I watched a driver reverse a car from a parking bay at right angles to the road, straight into a car driving along the road. The accident happened at walking pace, no-one was hurt and both cars had body panels that regain their shape after a low speed shunt.
  • August 22, 2014
    MIT researchers hack into traffic lights
    With permission from a local road agency, researchers in from the University of Michigan hacked into nearly 100 wirelessly networked traffic lights, highlighting security issues that they say are likely to pervade networked traffic infrastructure around the country. More than 40 states currently use such systems to keep traffic flowing as efficiently as possible, helping to reduce emissions and delays. The team, led by University of Michigan computer scientist J. Alex Halderman, found three major weaknes
  • September 25, 2020
    Destiny Thomas on transit's racist legacy
    The killing of George Floyd by US police sparked international protests and put Black Lives Matter into the spotlight. Dr Destiny Thomas, founder and CEO of Thrivance Group, talks to Adam Hill about the legacy of racism in transit, Covid-19, slow streets – and what comes next